Search


Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
5 min read
7,866 views

Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round....
11 min read
32,454 views


Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals
Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in...
3 min read
5,218 views

OSINT: Tracking the Suspect's Precise Location Using Wigle.net
Welcome back, my aspiring OSINT investigators! There is SO much information available to us on the Internet that sometimes it can be...
4 min read
49,546 views

Mr. Robot Hacks: How Elliot Hacked the FBI Cellphones
Welcome back, my Mr. Robot aficianados! In Season 2 of Mr. Robot, the FBI is on the trail of Elliot and f/society for the 5/9 hacks that...
3 min read
17,545 views


Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
4 min read
1,552 views


Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware...
5 min read
14,032 views

Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
5 min read
19,495 views

Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
3 min read
3,092 views


Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP's
Welcome back, my aspiring cyberwarriors! Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather...
3 min read
86,163 views


Why Hackers Make the Best InfoSec Engineers
At first blush, the idea of putting a hacker in charge of your information security might seem absurd or, at least, ill-advised. Who...
4 min read
2,567 views


Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
5 min read
70,751 views


Wi-Fi (802.11) Hacking: How to Hack the WPS PIN with Reaver
Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has...
4 min read
51,300 views


Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
3 min read
46,551 views

Metasploit Basics, Part 14: Updating the msfconsole
Welcome back my novice hackers! Recently, I have received numerous questions regarding how to update the msfconsole built into Kali....
2 min read
97,672 views

Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
3 min read
38,178 views